CVE-2024-27834

CWE-277CWE-30515 documents9 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 99.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 14
Latest updateMay 28

Description

The issue was addressed with improved checks. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, watchOS 10.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages16 packages

NVDapple/ipados< 17.5
CVEListV5apple/ios_and_ipados< 16.7.8+1
CVEListV5apple/tvos< 17.5
NVDapple/tvos< 17.5
CVEListV5apple/macos< 14.5

Also affects: Fedora 39, 40

🔴Vulnerability Details

4
OSV
CVE-2024-27834: The issue was addressed with improved checks2024-05-14
OSV
CVE-2024-27834: The issue was addressed with improved checks2024-05-14
GHSA
GHSA-4rmp-jjj9-cfm4: The issue was addressed with improved checks2024-05-14
CVEList
CVE-2024-27834: The issue was addressed with improved checks2024-05-13

📋Vendor Advisories

9
Ubuntu
WebKitGTK vulnerabilities2024-05-28
Red Hat
webkit: pointer authentication bypass2024-05-21
Apple
CVE-2024-27834: iOS 16.7.8 and iPadOS 16.7.82024-05-13
Apple
CVE-2024-27834: tvOS 17.52024-05-13
Apple
CVE-2024-27834: Safari 17.52024-05-13

🕵️Threat Intelligence

1
Bleepingcomputer
Apple fixes Safari WebKit zero-day flaw exploited at Pwn2Own2024-05-14